General
-
Target
Swoofer.exe
-
Size
8.6MB
-
Sample
241024-y3anhsshrd
-
MD5
290e1a8e3ea8371b051f2fcbc857965d
-
SHA1
f39373d5db77d97639e40fe96025a20005e79435
-
SHA256
b73ed9bf5d6c697cf0908b4152a7ed0f4b0e3f9005df6223b20634f0def23ef4
-
SHA512
cce56ca9f9de4b1a5f6d9290aeba5f206601fd5705e22db50e12d1341dc7fab3f2b8daa35b47fac66336685c9acb5cb5b1932147f3984a3bf0585da50e41de04
-
SSDEEP
196608:he0rDReNTfm/pf+xk4dWRptrbWOjgrE36vEQ:Uy/pWu4kRptrbvMrEqvEQ
Malware Config
Targets
-
-
Target
Swoofer.exe
-
Size
8.6MB
-
MD5
290e1a8e3ea8371b051f2fcbc857965d
-
SHA1
f39373d5db77d97639e40fe96025a20005e79435
-
SHA256
b73ed9bf5d6c697cf0908b4152a7ed0f4b0e3f9005df6223b20634f0def23ef4
-
SHA512
cce56ca9f9de4b1a5f6d9290aeba5f206601fd5705e22db50e12d1341dc7fab3f2b8daa35b47fac66336685c9acb5cb5b1932147f3984a3bf0585da50e41de04
-
SSDEEP
196608:he0rDReNTfm/pf+xk4dWRptrbWOjgrE36vEQ:Uy/pWu4kRptrbvMrEqvEQ
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-